______ describes the way a document is printed or displayed on a screen.
Options are:
Red, Thesaurus, Mailing, Page Orientation, Track Changes.

Answers

Answer 1

Answer:

Page orientation.

Explanation:

Because the other words have nothing to make sense in this sentence.


Related Questions

What Is Classification of Computers?

Answers

Answer:

Explanation:Sr.No.

Type

Specifications

1

PC (Personal Computer) or Micro-Computers

It is a single user computer system having a moderately powerful microprocessor. It is termed as a computer that is equipped microprocessor as its CPU.

2

Workstation

It is also a single user computer system, similar to the personal computer, however, has a more powerful microprocessor.

3

Mini-Computer

It is a multi-user computer system, capable of supporting hundreds of users simultaneously.

4

Main Frame

It is a multi-user computer system, capable of supporting hundreds of users simultaneously. Software technology is different from minicomputer.

5

Super-Computer

It is an extremely fast computer, which can execute hundreds of millions of instructions per second.

A _____ is an example of a systems program.
a. command interpreter
b. web browser
c. database system
d. programming ide

Answers

Command interpreter is an example of system porgram. In this question the correct option is a i.e Command interpreter

A software that is part of operating systems is known as a system program. System programs provide a platform to other programs or software. Command interpreter is one such example of system programs. Unlike graphical user interface (GUI) based programs, command interpreter handles and processes text commands entered by users or other programs.

Command interpreter provides an interface between users and computers. MS-DOS is an example of a command interpreter. Experienced and advanced users prefer to use command interpreters as they give fast and direct access to operating systems.

Why other options (b, c, and d) are not correct is explained briefly below:

Web browser: It is an application software to access the World Wide Web.Database system: It is a system software used to store, organize and retrieve data through queries.Programming ide: It is a software application that facilitates the programmers to develop software.

You can learn more about command interpreter at

https://brainly.com/question/14725990

#SPJ4

The pointer in a node points to? the data part of a node. the count part of a node. the pointer part of the node. the whole node.

Answers

The pointer in a node points to: D. the whole node.

What is a variable?

A variable can be defined as a specific name which refers to a location in computer memory and it is typically used for storing a value such as an integer.

What is a node?

A node can be defined as a self-referential object and it typically comprises a pointer to a variable which point to a variable of the same data type. Also, the pointer in a node primarily points to the next node.

In this context, we can reasonably infer and logically deduce that the pointer in a node always points to the whole node.

Read more on node here: https://brainly.com/question/24068343

#SPJ1

A radio station broadcasting a program is an example of ______. group of answer choices interpersonal communication mass communication media-centric communication broad communication

Answers

A radio station broadcasting a program is an example of option B. mass communication.

What is Mass communication?

Mass communication is known to be a term that connote the act or process of influencing or giving and exchanging of information via the use of mass media to a given large area of the population.

Note that it is one that is said to be understood for sharing   various forms of media and for the dissemination of information.

Therefore, A radio station broadcasting a program is an example of option B. mass communication.

Learn more about mass communication from

https://brainly.com/question/20696487

#SPJ1

What helps ensure that the information is correct? group of answer choices
a. transactions
b. documents
c. internal controls
d. data transmissions

Answers

Option (c) internal controls is the correct answer. Internal controls in any organization help ensure that the information is correct.

Internal controls  are the processes and records that ensure the integrity of accounting and financial information and prevent the companies from producing the incorrect information, and protect data from being stolen.  

When information related to finance is processed, a number of internal controls are performed to check if the provided information is correct, complete and authorized. They make sure that provided information is in accordance with approved standard and measures.

To ensure that the information is correct, internal controls involve following processes:

Perform proper authorization of transactions and activitiesManaging adequate documents and recordsEstablishing physical control over assets and records andHaving independent checks on performance.

While the other options (a) transactions, (b) documents, and (d) data transmissions are incorrect because:

Transactions: Transaction is money that moves in or out of the organization in order to purchase and deliver services, pay salaries to employees, invest in another business etc.Documents: Documents are files of several types that record all the details about a firm's internal and external dealings, management plans and transactions.Data transmission: Data transmission refers to the exchange of data between organizations in the form of terms and conditions, agreements, rules and regulations, or policies.

You can learn more about internal control at

https://brainly.com/question/17056417

#SPJ4

Binary is the lowest level of abstraction because all data used and stored by computers use tiny transistors (switches) as memory storage. True or false

Answers

Binary is the lowest level of abstraction because all data used and stored by computers use tiny transistors (switches) as memory storage is a false statement.

What is the lowest level of abstraction?

The Physical level is known to be the lowest level of abstraction and it is said to be one that tells the ways that a system do usually use to save any form of data.

Therefore, based on the above, one can say that Binary is the lowest level of abstraction because all data used and stored by computers use tiny transistors (switches) as memory storage is a false statement.

Learn more about abstraction  from

https://brainly.com/question/7994244

#SPJ1

_________ is the systematic collection and analysis of publicly available information about consumers, competitors, and developments in the marketing environment.

Answers

Marketing intelligence is the systematic collection and analysis of publicly available information about consumers, competitors, and developments in the marketing environment.

What is marketing intelligence?

Gathering information from multiple data sources, analyzing it, dissecting it into manageable subsets, and distributing it to the appropriate company department are all components of marketing intelligence.

Thus, the methodical gathering and examination of data about customers, rivals, and changes in the marketing environment is known as marketing intelligence.

To learn more about marketing intelligence, refer to the link:

https://brainly.com/question/14340717

#SPJ1

What word is used today to refer to network-connected hardware devices?
a. client
b. endpoint
c. device
d. host

Answers

endpoint is the word used today to refer to network-connected hardware devices.

An endpoint is a network-connected hardware device, such as a computer, printer or smartphone. Today, the term endpoint is used to refer to any device that can be connected to a network.

Endpoints are important because they are the devices that users interact with when they access a network. For example, when you log into a website, you are using an endpoint (your computer) to connect to a server.

Endpoints can be either physical or virtual. Physical endpoints are actual hardware devices, while virtual endpoints are software-based and run on top of physical hardware.

Most endpoint security solutions focus on physical devices, but as more and more devices become virtual, it's important to consider security for both physical and virtual endpoints.

Learn more on endpoints here:

https://brainly.com/question/28221902

#SPJ4

what is a constructor in java? a constructor is something that holds the private state of an instance. a constructor allows us to create a new instance of a class, usually initializing instance variables. a constructor is a method with instructions on how to use a class. a constructor is a syntax rule in java for placing curly brackets.

Answers

Answer:

A constructor allows us to create a new instance of a class, usually initializing instance variables.

Explanation:

When a new object is created, the constructor is called. A constructor can be used to set initial values for object attributes.

If an ip address has the number 194 in the first octet, it is a class _______ address.

Answers

If an IP address has the number 194 in the first octet, it is a class C address.

If you're working with IP addresses, it's important to know the different classes. An IP address can be classified as a Class A, B, or C address. If the first octet of an IP address is 1-126, it's a Class A address. If the first octet is 127, it's a Class B address. And if the first octet is 128-191, it's a Class C address.

The number in the first octet tells us what class the address is in. For example, an address with the first octet of 194 is a Class C address. Class C addresses are most commonly used for home and small office networks.

Knowing the class of an IP address is important because it determines the range of addresses that can be used. For example, Class A addresses can be used for networks with up to 16 million hosts, while Class B addresses can be used for networks with up to 65,000 hosts.

So, when you're working with IP addresses, be sure to keep the different classes in mind. Knowing which class an address is in will help you understand what range of addresses can be used.

Learn more about IP address here:

https://brainly.com/question/27961221

#SPJ4

what is polling in python and what is active variable??

Answers

Answer:

Polling is a powerful python utility used to wait for a function to return a certain expected condition.An active variable is a variable that is manipulated by the investigator.

Explanation:

Spear-phishing is when hackers search for and use personal data to directly target a person in a phishing email. of the following, which would provide the most credibility in a spear-phishing email?

Answers

Of the aforementioned, the option which provides the most credibility in a spear-phishing email is: C. knowing a recent store that you shopped at.

What is social engineering?

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security through cyber attacks.

Basically, social engineering refers to a manipulative cyber attack strategy or technique that involves the deploying deceptive and malicious activities on unsuspecting victims, in order to gain unauthorized access to their confidential or private information for fraud-related purposes.

Generally, cyber attacks often require long periods of planning and intelligence gathering to lay the groundwork. Also, some examples of social engineering attacks include the following:

VishingPretextingPhishingQuid pro quoBaitingTailgatingWater-holingSpear phishing

Of the aforementioned, the option which provides the most credibility in a spear-phishing email is "knowing a recent store that you shopped at." because it included an information of interest to the target.

Read more on spear-phishing here: https://brainly.com/question/24156548

#SPJ1

Complete Question:

Spear-phishing is when hackers search for and use personal data to directly target a person in a phishing email. Of the following, which would provide the most credibility in a spear-phishing email?

A.Knowing your full name

B.Knowing your hobbies

C.Knowing a recent store that you shopped at

D. Knowing your address

____ technology uses digital signaling in which the cable carries only one channel of digital data.

Answers

Baseband coaxial technology uses digital signaling in which the cable carries only one channel of digital data.

What is a Baseband coaxial cable?

A baseband coaxial cable is known to be one that is used in networking.

It helps to send a single signal at a  given time and this is known to be done at a very high speed.

Note that a broadband coaxial cable can help to send or  transmit a lot of simultaneous signals via the use of different frequencies.

Therefore, Baseband coaxial technology uses digital signaling in which the cable carries only one channel of digital data.

Learn more about Network from

https://brainly.com/question/8118353
#SPJ1

How many residues separate amino acids that are stabilized by hydrogen bonds in α helices?.

Answers

The numbers of residues separate amino acids that are stabilized by hydrogen bonds in α helices is  3.6 amino acid residues.

Why are amino acids called residues?

The  Amino acids are known to be compounds that are said to be called residues if there is  two or more amino acids that are known to be bond with each other.

Note that the amino group on one amino acid is one that tends to interacts with the carboxyl group and as such  form a peptide bond.

Therefore, The numbers of residues separate amino acids that are stabilized by hydrogen bonds in α helices is  3.6 amino acid residues.

Learn more about amino acids from

https://brainly.com/question/2526971

#SPJ1

Which layer of the osi reference model handles logical addressing (ip addresses) and routing traffic?

Answers

The data link layer of the osi reference model handles logical addressing (ip addresses) and routing traffic.

A model reference is a Model block reference to another model. Model hierarchy is created by these references. The characteristics of each referenced model's defined interface's inputs and outputs are specified.

For instance, an actual outside wall may have dimensions and materials when describing the architecture of a specific house (which is a specific environment of a certain kind), but the idea of a wall (kind of entity) is included in the reference model.

A useful foundation for networking ideas is the OSI reference model. In essence, a sender injects data into a network. The data are supplied to a receiver after being relayed across a communication link. A variety of networking gear and software must collaborate in order to do this.

Learn more about reference model:

https://brainly.com/question/28192091

#SPJ4

Suppose we compute a depth-first search tree rooted at u and obtain a tree t that includes all nodes of g.

Answers

G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

What are DFS and BFS?

An algorithm for navigating or examining tree or graph data structures is called depth-first search. The algorithm moves as far as it can along each branch before turning around, starting at the root node.

The breadth-first search strategy can be used to look for a node in a tree data structure that has a specific property. Before moving on to the nodes at the next depth level, it begins at the root of the tree and investigates every node there.

First, we reveal that G exists a tree when both BFS-tree and DFS-tree are exact.

If G and T are not exact, then there should exist a border e(u, v) in G, that does not belong to T.

In such a case:

- in the DFS tree, one of u or v, should be a prototype of the other.

- in the BFS tree, u and v can differ by only one level.

Since, both DFS-tree and BFS-tree are the very tree T,

it follows that one of u and v should be a prototype of the other and they can discuss by only one party.

This means that the border joining them must be in T.

So, there can not be any limits in G which are not in T.

In the two-part of evidence:

Since G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

The complete question is:

We have a connected graph G = (V, E), and a specific vertex u ∈ V.

Suppose we compute a depth-first search tree rooted at u, and obtain a tree T that includes all nodes of G.

Suppose we then compute a breadth-first search tree rooted at u, and obtain the same tree T.

Prove that G = T. (In other words, if T is both a depth-first search tree and a breadth-first search tree rooted at u, then G cannot contain any edges that do not belong to T.)

To learn more about  DFS and BFS, refer to:

https://brainly.com/question/13014003

#SPJ4

The trace error button is an example of a _____, which may display near the active cell when data is being typed or edited in a worksheet.

Answers

The trace error button is an example of a Excel's spell checker, which may display near the active cell when data is being typed or edited in a worksheet.

What does trace error mean in Excel?

Trace Error in Excel is known to be a tool that allows a computer user to be able to trace their arrows back to cells referenced by the use of a formula if it tends to show  an error.

Note that the Trace Error tool is said to be available only if one is auditing a worksheet that is found inside of a workbook.

Therefore, The trace error button is an example of a Excel's spell checker, which may display near the active cell when data is being typed or edited in a worksheet.

Learn more about Excel's spell checker from

https://brainly.com/question/9419435

#SPJ1

Quizlet

Question

Electronic courts (e-courts) may also be referred to as _______.
a. web courthouses
b. computer courts
c. virtual courthouses
d. network courts
e. digital courthouses

Answers

Electronic courts (e-courts) may also be referred to as  c. virtual courthouses

What are virtual courts?

Virtual Courts is known to be the idea that is known to be aimed at removing the presence of litigant or any form of lawyer in the court as well as for adjudication of cases that is made on a virtual platform.

Note that this concept is one that has changed so that it can efficiently utilize court resources as well as  provide litigants.

Therefore, Electronic courts (e-courts) may also be referred to as  c. virtual courthouses

Learn more about courthouses from

https://brainly.com/question/18228641

#SPJ1

_____ session mode connects the host to a guest vm using rdp and allows cutting and pasting between the machines.

Answers

Enhanced session mode connects the host to a guest vm using RDP and allows cutting and pasting between the machines.

If you've ever used remote desktop to connect to a Windows guest VM, you know that it can be a little tricky to transfer files between the host and guest. Fortunately, there's a feature called enhanced session mode that makes it a breeze.

Enhanced session mode connects the host to a guest vm using RDP and allows cutting and pasting between the machines. This makes it super easy to transfer files between the host and guest, and also makes it possible to use local devices like printers and scanners from within the guest.

To use enhanced session mode, simply connect to your guest VM using RDP and then click the "Enable enhanced session mode" button. Once you do that, you'll be able to use all of your host's devices from within the guest.

Learn more on enhanced session mode here:

https://brainly.com/question/14488447

#SPJ4

_____ often function as standards or procedures to be used when configuring or maintaining systems. a. eisps b. essps c. syssps d. issps

Answers

SysSPs often function as standards or procedures to be used when configuring or maintaining systems.

What is the purpose of system-specific security policy?

System-specific security are known to be policies that is said to be based on the information security policies of a specific systems.

Note that System-Specific Security Policy, SysSP, is seen as a kind of a policy that is said to often functions as a form of  instructions or procedures that are known to be used in the  configuring of systems.

Therefore, based on the above, SysSPs often function as standards or procedures to be used when configuring or maintaining systems.

Learn more about Policy from

https://brainly.com/question/14897020

#SPJ1

If you suspect a computer is infected with a virus and you are ready to upgrade from windows 8 to windows 10, what is your best practice?

Answers

The best practice is to scan the computer for malware and then upgrade.

What is an Operating System?

An operating system (OS) is the software that handles all of the other application programs in a computer after being loaded into the machine by a boot program. The application programs interact with the operating system by requesting services via a predefined application program interface (API).

If you suspect a computer is infected with a virus and you are ready to upgrade from Windows 8 to Windows 10, then the best practice is to scan the computer for malware and then upgrade.

Hence, the best practice is to scan the computer for malware and then upgrade.

Learn more about Operating System here:

https://brainly.com/question/6689423

#SPJ1

I really do need help asap

Answers

The third one.

Explanation:

The first answer is missing colons after the "if-else" clauses.

The second answer is missing quotes inside the print statements.

The fourth answer is missing indentation (which results in a syntax error in Python).

describe at least five ways in which Information Technology can help students studying subject other than computing ​

Answers

Answer:

‘Computer Science’ and ‘information technology’ are completely different subjects. Information Technology (IT) is-

(i) the study,

(ii) design,

(iii) development,

(iv) implementation, and

(v) support or management

of computer-based information systems, particularly software applications and computer hardware.

Information Technology (IT) deals with the use of electronic computers and computer software to-

(i) convert,

(ii) store,

(iii) protect,

(iv) process,

(v) transmit, and

(vi) securely retrieve information.

Shortly, information technology (IT) itself means learning to use technology in business or in studies of some subject matter using technology.

Hence, IT could help students studying subjects other than computing with the above mentioned points considered.

Maintaining a detailed study log that identifies the interviews making phones calls. True or false

Answers

Maintaining a detailed study log that identifies the interviews making phones calls is a false statement.

What are the interviews?

An interview is known to be a kind of a structured form of a conversation and it is seen as the one where one participant is known to be asking the questions, and the other is said to be providing the answers.

In carrying out an interview, there is no need keeping tab  of the phone calls made because it is irrelevant.

Note that this is seen in common parlance as a word called "interview" and as such it can be called a one-on-one conversation that tends to exist between an interviewer and that of an interviewee.

Maintaining a detailed study log that identifies the interviews making phones calls is a false statement as it is not necessary.

Learn more about interviews from

https://brainly.com/question/8846894

#SPJ1

The central organizing tenant of the file-oriented approach is to store data related to.

Answers

The central organizing tenant of the file-oriented approach is to store data related to: D. a specific program.

What is data?

Data can be defined as a representation of factual instructions (information) in a formalized and structured manner, especially as a series of binary digits (bits) that are used on computer systems in a business organization for day-to-day activities.

What is DBMS?

DBMS is an abbreviation for database management system and it can be defined as a collection of software programs (applications) that enable various computer users to create, store, modify, migrate (transfer), retrieve and manage data in a relational database.

In database management system (DBMS), a file-oriented approach to storage is designed and developed to create the required files in sets when a business organization sells its products or services. This ultimately implies that, there is an independent relationship between each file with respect to the other files in storage and software program.

Read more on file-oriented approach here: https://brainly.com/question/14531687

#SPJ1

Complete Question:

The central organizing tenant of the file-oriented approach is to store data related to

A an entity

B a business division

C a transaction cycle

D a specific program

What does the -m switch do when used with the useradd command? type useradd -h or useradd --help at the prompt to answer the question.

Answers

Regardless of the system settings, the home directory is not created when the -m switch is used with the useradd command.

What is the useradd option?

Linux and other Unix-like operating systems employ a low-level programme called "useradd" to add or create user accounts. The useradd command is quite similar to "adducer," which is essentially just a symbolic link to it. In order to add users to a system, a low-level utility called useradd is utilized.

The majority of the time, adduser is preferable because it is more user-friendly. Before using useradd to create new accounts, review your documentation because your operating system might have a slightly different version.

Hence,  Regardless of the system settings, the home directory is not created when the -m switch is used with the useradd command.

To learn more about useradd, refer to:

https://brainly.com/question/24290640

#SPJ4

Facility automation uses internet of things (iot) to integrate automation into business functions to reduce reliance on machinery. True or false

Answers

Facility automation uses internet of things (iot) to integrate automation into business functions to reduce reliance on machinery is a true statement.

How is IoT used in automation?

The Internet of Things (IoT) is known to be one of the main driving factor that is said to have brought a lot of power which has helped in the  enabling of the growth as well as the development of industrial automation systems.

Note that IoT that is said to be used along with computer automation controls can be able to aid one to streamline industrial systems as well as improve data automation, with the aim of deleting errors and inefficiencies of  people.

Therefore, Facility automation uses internet of things (iot) to integrate automation into business functions to reduce reliance on machinery is a true statement.

Learn more about internet of things from

https://brainly.com/question/19995128
#SPJ1

Debra tracks her business finances in a spreadsheet. She wants to figure out how much she could increase profits if she raises prices on some products. What feature should she use to find the answer?.

Answers

On this spreadsheet, a feature which Debra should use to find the answer is the What-if analysis.

In order to execute the following actions on a data collection, a spreadsheet application is a type of computer software that is frequently made with cells that are organised in rows and columns in a tabular fashion:

GenerateSortCalculateFormatArrange

Debra, a short version of the Hebrew female given name Deborah, means "bee." The Book of Judges in the Old Testament has this Biblical phrase. The only female judge described in the Bible, Deborah was a hero and prophetess.

Phyllis Hilton, whose daughter Debra had EB, created DEBRA in 1978; it was the first organisation for EB patients in the globe.

Learn more about Debra:

https://brainly.com/question/28503666

#SPJ4

Which database can be used to find studies related to allied health sciences?1 embase 2 medline 3 national guidelines clearinghouse 4 cochrane database of systematic reviews

Answers

The database that can be used to find studies related to allied health sciences is option 3: national guidelines clearinghouse.

What is the National Quality Measures Clearinghouse?

The National Quality Measures Clearinghouse (NQMC) is known to be a database of measures that is said to be set up so as to meet some given or specific criteria for an inclusion.

Note that the Measures that are used in NQMC acre known to be classified into domains based on the domain framework.

Therefore, The database that can be used to find studies related to allied health sciences is option 3: national guidelines clearinghouse.

Learn more about database from

https://brainly.com/question/518894
#SPJ1

System software is usually divided into two categories: operating systems and ____ programs.

Answers

Answer:

Utility

Explanation:

Other Questions
Given: A= {2, 4, 6, 8}B= {1, 3, 5, 7}C= {3, 6, 9}7. (A intersection to B) union C =Please Answer pls I need it tomorrow The number of first semester discipline referrals at pendleton co. high school decreased by ___________ from before the implementation of pbis five years ago to the current school year. What is Valerie looking for?D. her notebookValerie found what she was looking for. Vrai ou faux?Faux.What is the last thing Christine tells Valerie to do?C. buy a new notebook. Developed from common law, manslaughter describes the ______ killing of someone in the heat of passion. Globalization is the trend of the world economy becoming a more _______ system. multiple choice question. interdependent ethnocentric independent monochronic Personality psychology is considered a hub topic because it incorporates __________. Explain why the properties of polycrystalline materials are most often isotropic? 3, 6)5. Mr. Tran purchased a phone cardwith 300 minutes on it. If he usesthe card to make 2 hours of calls,how many minutes remain on hisphone card? explain how the line spectrum of hydrogen atom in Lyman series is formed Pleasure cruises and exotic vacations take advantage of which consumer behavior trend? In the saw-toothed inventory pattern, inventory decreases at the_______rate of demand. Ageism is ________ and discrimination toward individuals based solely on their age A group of nurses are implementing a new, evidence-based infection control regimen on the unit. which action should the nurses prioritize as the final step? For which situations is it appropriate to use a sample? Select three options.1What percentage of pick-up truck drivers want their next vehicle purchase to be another pick-up truck?2What is the average number of rainbows each year in Honolulu?3How many pedestrians would use a walkway built over a busy road?4How many police cars are equipped with computers?5What is the most popular car color in the teachers parking lot? An enterprise resource planning system integrates all functions of the enterprise. true false Kiana had borrowed a book from the school library. She has notreturned it after two months. She keeps forgetting to returnthe book.What will you tell them to do in the following situation Gardening offers many more benefits than just healthy fruits and vegetables. Recent studies show that gardening reduces stress and improves mood when people spend 30 minutes a day in their gardens. It is also a great source of exercise. While gardening is not a great cardiovascular workout, the repetitive tasks of digging, weeding, and planting are effective forms of low-impact strengthening and stretching. Besides being good for the mind and body, garden preparation is key to successful growing. Once weeds are removed and soil is ready, seeds have a healthy place to grow. Time and energy spent preparing a garden reduces the amount of time that would be spent maintaining the garden throughout the growing season.1What is one of the central ideas of the passage? Semen is made up of a mixture of secretions from all of the following except? a) prostate gland b) bulbourethral glands c) testes d) seminal vesicles _______________ liberties place restraints on how government is supposed to act, while ____________ liberties limits what the government has the power to do. Find the measure of the missing angles.55Xy